[ 30.0723523] ASan: Unauthorized Access In 0xffffffff80a7f1be: Addr 0xffffa5801305f1ac [4 bytes, read] [ 30.0723523] #0 0xffffffff80a7f1be in in6_print [ 30.0723523] #1 0xffffffff80a7f87f in sin6_print [ 30.0723523] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.0823685] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.0823685] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.0823685] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.0823685] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.0823685] #7 0xffffffff80a8002f in in6_selectroute [ 30.0923837] #8 0xffffffff80a80437 in in6_selectsrc [ 30.0923837] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.1024003] #10 0xffffffff80f69206 in do_sys_connect [ 30.1124146] #11 0xffffffff80f693ef in sys_connect [ 30.1124146] #12 0xffffffff80ebbb34 in sys___syscall [ 30.1224312] #13 0xffffffff80265b1e in syscall [ 30.1224312] ASan: Unauthorized Access In 0xffffffff80a7f68c: Addr 0xffffa5801305f1b0 [4 bytes, read] [ 30.1324484] #0 0xffffffff80a7f68c in in6_print [ 30.1424624] #1 0xffffffff80a7f87f in sin6_print [ 30.1424624] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.1524793] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.1624946] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.1624946] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.1725112] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.1825273] #7 0xffffffff80a8002f in in6_selectroute [ 30.1825273] #8 0xffffffff80a80437 in in6_selectsrc [ 30.1925442] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.2025583] #10 0xffffffff80f69206 in do_sys_connect [ 30.2025583] #11 0xffffffff80f693ef in sys_connect [ 30.2125741] #12 0xffffffff80ebbb34 in sys___syscall [ 30.2125741] #13 0xffffffff80265b1e in syscall [ 30.2225897] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f1ac [2 bytes, read] [ 30.2326049] #0 0xffffffff80a7f480 in in6_print [ 30.2426232] #1 0xffffffff80a7f87f in sin6_print [ 30.2426232] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.2526405] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.2526405] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.2626541] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.2726704] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.2726704] #7 0xffffffff80a8002f in in6_selectroute [ 30.2826859] #8 0xffffffff80a80437 in in6_selectsrc [ 30.2927026] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.2927026] #10 0xffffffff80f69206 in do_sys_connect [ 30.3027197] #11 0xffffffff80f693ef in sys_connect [ 30.3027197] #12 0xffffffff80ebbb34 in sys___syscall [ 30.3127363] #13 0xffffffff80265b1e in syscall [ 30.3227496] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f1ae [2 bytes, read] [ 30.3327649] #0 0xffffffff80a7f480 in in6_print [ 30.3327649] #1 0xffffffff80a7f87f in sin6_print [ 30.3427840] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.3427840] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.3527996] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.3628152] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.3628152] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.3728330] #7 0xffffffff80a8002f in in6_selectroute [ 30.3828474] #8 0xffffffff80a80437 in in6_selectsrc [ 30.3828474] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.3928624] #10 0xffffffff80f69206 in do_sys_connect [ 30.4028795] #11 0xffffffff80f693ef in sys_connect [ 30.4028795] #12 0xffffffff80ebbb34 in sys___syscall [ 30.4128938] #13 0xffffffff80265b1e in syscall [ 30.4128938] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f1b0 [2 bytes, read] [ 30.4229090] #0 0xffffffff80a7f480 in in6_print [ 30.4329272] #1 0xffffffff80a7f87f in sin6_print [ 30.4329272] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.4429410] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.4529581] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.4529581] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.4629730] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.4729891] #7 0xffffffff80a8002f in in6_selectroute [ 30.4729891] #8 0xffffffff80a80437 in in6_selectsrc [ 30.4830043] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.4930220] #10 0xffffffff80f69206 in do_sys_connect [ 30.4930220] #11 0xffffffff80f693ef in sys_connect [ 30.5030354] #12 0xffffffff80ebbb34 in sys___syscall [ 30.5030354] #13 0xffffffff80265b1e in syscall [ 30.5130530] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f1b2 [2 bytes, read] [ 30.5230697] #0 0xffffffff80a7f480 in in6_print [ 30.5230697] #1 0xffffffff80a7f87f in sin6_print [ 30.5330838] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.5430990] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.5430990] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.5531188] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.5631312] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.5631312] #7 0xffffffff80a8002f in in6_selectroute [ 30.5731479] #8 0xffffffff80a80437 in in6_selectsrc [ 30.5731479] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.5831631] #10 0xffffffff80f69206 in do_sys_connect [ 30.5931797] #11 0xffffffff80f693ef in sys_connect [ 30.5931797] #12 0xffffffff80ebbb34 in sys___syscall [ 30.6031957] #13 0xffffffff80265b1e in syscall [ 30.6132126] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f1b4 [2 bytes, read] [ 30.6232270] #0 0xffffffff80a7f480 in in6_print [ 30.6232270] #1 0xffffffff80a7f87f in sin6_print [ 30.6332436] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.6332436] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.6432588] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.6532758] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.6532758] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.6632918] #7 0xffffffff80a8002f in in6_selectroute [ 30.6632918] #8 0xffffffff80a80437 in in6_selectsrc [ 30.6733097] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.6833224] #10 0xffffffff80f69206 in do_sys_connect [ 30.6833224] #11 0xffffffff80f693ef in sys_connect [ 30.6933393] #12 0xffffffff80ebbb34 in sys___syscall [ 30.7033546] #13 0xffffffff80265b1e in syscall [ 30.7033546] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f1b6 [2 bytes, read] [ 30.7133706] #0 0xffffffff80a7f480 in in6_print [ 30.7233858] #1 0xffffffff80a7f87f in sin6_print [ 30.7233858] #2 0xffffffff80f4e421 in sockaddr_checklen [ 30.7334037] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 30.7434186] #4 0xffffffff80f4e64f in sockaddr_dup [ 30.7434186] #5 0xffffffff8105fd90 in rtcache_setdst [ 30.7534349] #6 0xffffffff810601a7 in rtcache_lookup2 [ 30.7534349] #7 0xffffffff80a8002f in in6_selectroute [ 30.7634497] #8 0xffffffff80a80437 in in6_selectsrc [ 30.7734659] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.7734659] #10 0xffffffff80f69206 in do_sys_connect [ 30.7834817] #11 0xffffffff80f693ef in sys_connect [ 30.7935007] #12 0xffffffff80ebbb34 in sys___syscall [ 30.7935007] #13 0xffffffff80265b1e in syscall [ 30.8035140] sockaddr_checklen: 0xffffa5801305f1a0 bad len af=24 socklen=12 len=28 [inet6: ::] [ 30.8135284] sockaddr_checklen: 0xffffa5816ea995b0 bad len af=24 socklen=12 len=28 [inet6: [80:0:81a5:ffff::5617:b00]:20017] [ 30.8235443] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f1b2 [1 byte, read] [ 30.8335602] #0 0xffffffff8105a3bf in rn_match [ 30.8335602] #1 0xffffffff81062e5d in rt_matchaddr [ 30.8435773] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 30.8535960] #3 0xffffffff8105ed8b in _rtcache_init [ 30.8535960] #4 0xffffffff81060272 in rtcache_lookup2 [ 30.8636098] #5 0xffffffff80a8002f in in6_selectroute [ 30.8736257] #6 0xffffffff80a80437 in in6_selectsrc [ 30.8736257] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.8836420] #8 0xffffffff80f69206 in do_sys_connect [ 30.8836420] #9 0xffffffff80f693ef in sys_connect [ 30.8936576] #10 0xffffffff80ebbb34 in sys___syscall [ 30.9036727] #11 0xffffffff80265b1e in syscall [ 30.9036727] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f1b4 [1 byte, read] [ 30.9136911] #0 0xffffffff8105a3bf in rn_match [ 30.9237047] #1 0xffffffff81062e5d in rt_matchaddr [ 30.9237047] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 30.9337208] #3 0xffffffff8105ed8b in _rtcache_init [ 30.9437365] #4 0xffffffff81060272 in rtcache_lookup2 [ 30.9437365] #5 0xffffffff80a8002f in in6_selectroute [ 30.9537552] #6 0xffffffff80a80437 in in6_selectsrc [ 30.9637689] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 30.9637689] #8 0xffffffff80f69206 in do_sys_connect [ 30.9737865] #9 0xffffffff80f693ef in sys_connect [ 30.9838010] #10 0xffffffff80ebbb34 in sys___syscall [ 30.9838010] #11 0xffffffff80265b1e in syscall [ 30.9938166] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f1b4 [1 byte, read] [ 31.0038309] #0 0xffffffff8105a3bf in rn_match [ 31.0038309] #1 0xffffffff81062e5d in rt_matchaddr [ 31.0138501] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 31.0238645] #3 0xffffffff8105ed8b in _rtcache_init [ 31.0238645] #4 0xffffffff81060272 in rtcache_lookup2 [ 31.0338895] #5 0xffffffff80a8002f in in6_selectroute [ 31.0439003] #6 0xffffffff80a80437 in in6_selectsrc [ 31.0439003] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 31.0539130] #8 0xffffffff80f69206 in do_sys_connect [ 31.0539130] #9 0xffffffff80f693ef in sys_connect [ 31.0639293] #10 0xffffffff80ebbb34 in sys___syscall [ 31.0739433] #11 0xffffffff80265b1e in syscall [ 31.0739433] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f1b7 [1 byte, read] [ 31.0839591] #0 0xffffffff8105a3bf in rn_match [ 31.0939770] #1 0xffffffff81062e5d in rt_matchaddr [ 31.0939770] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 31.1039917] #3 0xffffffff8105ed8b in _rtcache_init [ 31.1140071] #4 0xffffffff81060272 in rtcache_lookup2 [ 31.1140071] #5 0xffffffff80a8002f in in6_selectroute [ 31.1240241] #6 0xffffffff80a80437 in in6_selectsrc [ 31.1340402] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 31.1340402] #8 0xffffffff80f69206 in do_sys_connect [ 31.1440562] #9 0xffffffff80f693ef in sys_connect [ 31.1540754] #10 0xffffffff80ebbb34 in sys___syscall [ 31.1540754] #11 0xffffffff80265b1e in syscall 03:14:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) r2 = semget$private(0x0, 0x3, 0x100) semctl$SETVAL(r2, 0x6, 0x8, &(0x7f0000000000)=0x7) getsockopt$inet_opts(r1, 0x0, 0x1, 0x0, 0x0) 03:14:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x4, 0x1) r3 = dup2(r2, r1) mkdirat(r2, &(0x7f0000000180)='./file0\x00', 0x0) faccessat(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffffffffffc) [ 31.4845968] ASan: Unauthorized Access In 0xffffffff80a7f1be: Addr 0xffffa5801305f094 [4 bytes, read] [ 31.5004446] #0 0xffffffff80a7f1be in in6_print [ 31.5064953] #1 0xffffffff80a7f87f in sin6_print [ 31.5064953] #2 0xffffffff80f4e421 in sockaddr_checklen [ 31.5192382] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 31.5256465] #4 0xffffffff80f4e64f in sockaddr_dup [ 31.5256465] #5 0xffffffff8105fd90 in rtcache_setdst [ 31.5383619] #6 0xffffffff810601a7 in rtcache_lookup2 [ 31.5448534] #7 0xffffffff80a8002f in in6_selectroute [ 31.5448534] #8 0xffffffff80a80437 in in6_selectsrc [ 31.5576624] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 31.5647259] #10 0xffffffff80f69206 in do_sys_connect [ 31.5647259] #11 0xffffffff80f693ef in sys_connect [ 31.5773644] #12 0xffffffff80ebbb34 in sys___syscall [ 31.5773644] #13 0xffffffff80265b1e in syscall [ 31.5896197] ASan: Unauthorized Access In 0xffffffff80a7f68c: Addr 0xffffa5801305f098 [4 bytes, read] [ 31.5987284] #0 0xffffffff80a7f68c in in6_print [ 31.6047879] #1 0xffffffff80a7f87f in sin6_print [ 31.6047879] #2 0xffffffff80f4e421 in sockaddr_checklen [ 31.6174034] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 31.6174034] #4 0xffffffff80f4e64f in sockaddr_dup [ 31.6300591] #5 0xffffffff8105fd90 in rtcache_setdst [ 31.6364598] #6 0xffffffff810601a7 in rtcache_lookup2 [ 31.6364598] #7 0xffffffff80a8002f in in6_selectroute [ 31.6494347] #8 0xffffffff80a80437 in in6_selectsrc [ 31.6557533] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 31.6557533] #10 0xffffffff80f69206 in do_sys_connect [ 31.6691562] #11 0xffffffff80f693ef in sys_connect [ 31.6753894] #12 0xffffffff80ebbb34 in sys___syscall [ 31.6753894] #13 0xffffffff80265b1e in syscall [ 31.6876468] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f094 [2 bytes, read] [ 31.6967602] #0 0xffffffff80a7f480 in in6_print [ 31.6967602] #1 0xffffffff80a7f87f in sin6_print [ 31.7087548] #2 0xffffffff80f4e421 in sockaddr_checklen [ 31.7154095] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 31.7154095] #4 0xffffffff80f4e64f in sockaddr_dup [ 31.7280558] #5 0xffffffff8105fd90 in rtcache_setdst [ 31.7349957] #6 0xffffffff810601a7 in rtcache_lookup2 [ 31.7349957] #7 0xffffffff80a8002f in in6_selectroute [ 31.7474315] #8 0xffffffff80a80437 in in6_selectsrc [ 31.7474315] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 31.7605403] #10 0xffffffff80f69206 in do_sys_connect [ 31.7669283] #11 0xffffffff80f693ef in sys_connect [ 31.7669283] #12 0xffffffff80ebbb34 in sys___syscall [ 31.7793281] #13 0xffffffff80265b1e in syscall [ 31.7850884] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f096 [2 bytes, read] [ 31.7850884] #0 0xffffffff80a7f480 in in6_print [ 31.8000429] #1 0xffffffff80a7f87f in sin6_print [ 31.8059830] #2 0xffffffff80f4e421 in sockaddr_checklen [ 31.8059830] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 31.8188169] #4 0xffffffff80f4e64f in sockaddr_dup [ 31.8251373] #5 0xffffffff8105fd90 in rtcache_setdst [ 31.8251373] #6 0xffffffff810601a7 in rtcache_lookup2 [ 31.8376162] #7 0xffffffff80a8002f in in6_selectroute [ 31.8376162] #8 0xffffffff80a80437 in in6_selectsrc [ 31.8501924] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 31.8569996] #10 0xffffffff80f69206 in do_sys_connect [ 31.8569996] #11 0xffffffff80f693ef in sys_connect [ 31.8695254] #12 0xffffffff80ebbb34 in sys___syscall [ 31.8758161] #13 0xffffffff80265b1e in syscall [ 31.8758161] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f098 [2 bytes, read] [ 31.8906611] #0 0xffffffff80a7f480 in in6_print [ 31.8964995] #1 0xffffffff80a7f87f in sin6_print [ 31.8964995] #2 0xffffffff80f4e421 in sockaddr_checklen [ 31.9089831] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 31.9152807] #4 0xffffffff80f4e64f in sockaddr_dup [ 31.9152807] #5 0xffffffff8105fd90 in rtcache_setdst [ 31.9276690] #6 0xffffffff810601a7 in rtcache_lookup2 [ 31.9276690] #7 0xffffffff80a8002f in in6_selectroute [ 31.9403977] #8 0xffffffff80a80437 in in6_selectsrc [ 31.9466017] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 31.9466017] #10 0xffffffff80f69206 in do_sys_connect [ 31.9597685] #11 0xffffffff80f693ef in sys_connect [ 31.9658706] #12 0xffffffff80ebbb34 in sys___syscall [ 31.9658706] #13 0xffffffff80265b1e in syscall [ 31.9779014] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f09a [2 bytes, read] [ 31.9870175] #0 0xffffffff80a7f480 in in6_print [ 31.9870175] #1 0xffffffff80a7f87f in sin6_print [ 31.9988035] #2 0xffffffff80f4e421 in sockaddr_checklen [ 32.0054246] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 32.0054246] #4 0xffffffff80f4e64f in sockaddr_dup [ 32.0177326] #5 0xffffffff8105fd90 in rtcache_setdst [ 32.0177326] #6 0xffffffff810601a7 in rtcache_lookup2 [ 32.0303831] #7 0xffffffff80a8002f in in6_selectroute [ 32.0367574] #8 0xffffffff80a80437 in in6_selectsrc [ 32.0367574] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 32.0497787] #10 0xffffffff80f69206 in do_sys_connect [ 32.0561398] #11 0xffffffff80f693ef in sys_connect [ 32.0561398] #12 0xffffffff80ebbb34 in sys___syscall [ 32.0685412] #13 0xffffffff80265b1e in syscall [ 32.0685412] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f09c [2 bytes, read] [ 32.0833941] #0 0xffffffff80a7f480 in in6_print [ 32.0892441] #1 0xffffffff80a7f87f in sin6_print [ 32.0955671] #2 0xffffffff80f4e421 in sockaddr_checklen [ 32.0955671] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 32.1080036] #4 0xffffffff80f4e64f in sockaddr_dup [ 32.1080036] #5 0xffffffff8105fd90 in rtcache_setdst [ 32.1203968] #6 0xffffffff810601a7 in rtcache_lookup2 [ 32.1267690] #7 0xffffffff80a8002f in in6_selectroute [ 32.1267690] #8 0xffffffff80a80437 in in6_selectsrc [ 32.1393200] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 32.1461222] #10 0xffffffff80f69206 in do_sys_connect [ 32.1461222] #11 0xffffffff80f693ef in sys_connect [ 32.1586117] #12 0xffffffff80ebbb34 in sys___syscall [ 32.1586117] #13 0xffffffff80265b1e in syscall [ 32.1706388] ASan: Unauthorized Access In 0xffffffff80a7f480: Addr 0xffffa5801305f09e [2 bytes, read] [ 32.1797639] #0 0xffffffff80a7f480 in in6_print [ 32.1857103] #1 0xffffffff80a7f87f in sin6_print [ 32.1857103] #2 0xffffffff80f4e421 in sockaddr_checklen [ 32.1980628] #3 0xffffffff80f4e4ea in sockaddr_alloc [ 32.1980628] #4 0xffffffff80f4e64f in sockaddr_dup [ 32.2104664] #5 0xffffffff8105fd90 in rtcache_setdst [ 32.2167502] #6 0xffffffff810601a7 in rtcache_lookup2 [ 32.2167502] #7 0xffffffff80a8002f in in6_selectroute [ 32.2294830] #8 0xffffffff80a80437 in in6_selectsrc [ 32.2357910] #9 0xffffffff80aa7b7f in rip6_connect_wrapper [ 32.2357910] #10 0xffffffff80f69206 in do_sys_connect [ 32.2488538] #11 0xffffffff80f693ef in sys_connect [ 32.2488538] #12 0xffffffff80ebbb34 in sys___syscall [ 32.2612569] #13 0xffffffff80265b1e in syscall [ 32.2670000] sockaddr_checklen: 0xffffa5801305f088 bad len af=24 socklen=12 len=28 [inet6: ::] [ 32.2762253] sockaddr_checklen: 0xffffa5816ef975b0 bad len af=24 socklen=12 len=28 [inet6: [80:0:81a5:ffff::150d:ed00]:20017] [ 32.2874148] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f09a [1 byte, read] [ 32.2964419] #0 0xffffffff8105a3bf in rn_match [ 32.2964419] #1 0xffffffff81062e5d in rt_matchaddr [ 32.3083327] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 32.3159171] #3 0xffffffff8105ed8b in _rtcache_init [ 32.3159171] #4 0xffffffff81060272 in rtcache_lookup2 [ 32.3284187] #5 0xffffffff80a8002f in in6_selectroute [ 32.3284187] #6 0xffffffff80a80437 in in6_selectsrc [ 32.3409927] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 32.3477996] #8 0xffffffff80f69206 in do_sys_connect [ 32.3477996] #9 0xffffffff80f693ef in sys_connect [ 32.3601784] #10 0xffffffff80ebbb34 in sys___syscall [ 32.3665101] #11 0xffffffff80265b1e in syscall [ 32.3665101] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f09c [1 byte, read] [ 32.3816673] #0 0xffffffff8105a3bf in rn_match [ 32.3874337] #1 0xffffffff81062e5d in rt_matchaddr [ 32.3874337] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 32.4010248] #3 0xffffffff8105ed8b in _rtcache_init [ 32.4072927] #4 0xffffffff81060272 in rtcache_lookup2 [ 32.4072927] #5 0xffffffff80a8002f in in6_selectroute [ 32.4201375] #6 0xffffffff80a80437 in in6_selectsrc [ 32.4263377] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 32.4263377] #8 0xffffffff80f69206 in do_sys_connect [ 32.4395372] #9 0xffffffff80f693ef in sys_connect [ 32.4461254] #10 0xffffffff80ebbb34 in sys___syscall [ 32.4461254] #11 0xffffffff80265b1e in syscall [ 32.4577010] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f09c [1 byte, read] [ 32.4667253] #0 0xffffffff8105a3bf in rn_match [ 32.4667253] #1 0xffffffff81062e5d in rt_matchaddr [ 32.4791127] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 32.4866117] #3 0xffffffff8105ed8b in _rtcache_init [ 32.4866117] #4 0xffffffff81060272 in rtcache_lookup2 [ 32.4991866] #5 0xffffffff80a8002f in in6_selectroute [ 32.5062221] #6 0xffffffff80a80437 in in6_selectsrc [ 32.5062221] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 32.5187209] #8 0xffffffff80f69206 in do_sys_connect [ 32.5187209] #9 0xffffffff80f693ef in sys_connect [ 32.5310424] #10 0xffffffff80ebbb34 in sys___syscall [ 32.5373368] #11 0xffffffff80265b1e in syscall [ 32.5373368] ASan: Unauthorized Access In 0xffffffff8105a3bf: Addr 0xffffa5801305f09f [1 byte, read] [ 32.5521113] #0 0xffffffff8105a3bf in rn_match [ 32.5579025] #1 0xffffffff81062e5d in rt_matchaddr [ 32.5579025] #2 0xffffffff8105e333 in rtalloc1_locked.constprop.15 [ 32.5715181] #3 0xffffffff8105ed8b in _rtcache_init [ 32.5777057] #4 0xffffffff81060272 in rtcache_lookup2 [ 32.5777057] #5 0xffffffff80a8002f in in6_selectroute 03:14:15 executing program 2: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ftruncate(r0, 0x1) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) shutdown(r0, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x100) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:14:15 executing program 3: r0 = semget$private(0x0, 0x7, 0x244) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000000)={0x0, 0x0}, 0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getgroups(0x8, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0]) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000180)={{0x2, r1, r3, r5, r9, 0x40, 0x1}, 0x80000000, 0x1, 0x1000}) r10 = socket$unix(0x1, 0x2, 0x0) connect$unix(r10, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0xa) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') sendmsg$unix(r10, &(0x7f00000005c0)={&(0x7f00000002c0)=@abs={0x0, 0x0, 0x0}, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000300)="85f07d4711f4b930617ace1ff660ca773b13732e22b82eb18707ef7b450e2a7883a18f7f6b936768a7dbb4edf3b88809a5fda6c5315b97bc287c79a9695727ce8a7404d34a9e438477909fb45fccb64bec89b4158ef064", 0x57}, {&(0x7f0000000380)="18791e2aa71bdf9c5386d27059fba55c6e1dd22575f0e2b9aee5fb7ad4d5f67cc363034b45465d00e036611d17665eebbfeb32a263ff45b7cb9ef347f33457f83862a16d67ca2061bb17d93a7e71f9c985009bf5f9cf589b9c15a73371996f562a828e70cb13cda9e7da14ae3e70ac4bce2c406887e62c78e8d2690bc7e35debab94fa2bb4fd487534ab83cfaa8e150e30c949c557efbe6310431f4e314334e5b370a3c0c7184b669df9", 0xaa}, {&(0x7f0000000440)="402b4bc2ead82365c07dd227440dede8c14c7c2bf798509748746cbdd7125a397bc367287f44e2b2c4a01919b46188b30068825c2b4baca524715f3443748874eb90a4a7c63f23c6053c9ad124954fe384897fff05d7221fa0210b", 0x5b}], 0x3, &(0x7f0000000500)=[@rights={0x18, 0xffff, 0x1, [r10]}, @rights={0x18, 0xffff, 0x1, [r10, r10]}, @rights={0x20, 0xffff, 0x1, [r10, r10, r10, r10]}, @rights={0x28, 0xffff, 0x1, [r10, r10, r10, r10, r10]}, @cred={0x20, 0xffff, 0x2, r4, r2, r9}], 0x98, 0x40b}, 0xa) getsockopt$SO_PEERCRED(r10, 0xffff, 0x11, &(0x7f0000000600), 0xc) r11 = shmget(0x0, 0xf000, 0x10, &(0x7f0000ff1000/0xf000)=nil) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000640)={{0x77d, r5, r8, r2, r6, 0x100, 0x80000000}, 0xe4bd, 0x1c96, 0x2000000000000000}) semget$private(0x0, 0x7, 0x20a) r12 = semget$private(0x0, 0x2, 0x2) getgroups(0x2, &(0x7f00000006c0)=[r7, r3]) semctl$IPC_RMID(r12, 0x0, 0x0) write(r10, &(0x7f0000000700)="dc72fa67dcfe541ec1907bd4e02b0deaf79ef53122d8a01f3058ec74c33222cbb119fd6be734b7c09dd62a2d16ac503044e00f76f7ba79ea3006fcad854d52bb9d1e89177064b5533fad93fc77f4a30a16f2d59caa2499f3d62d9e30d7f139da1f5073b225133c6a47aaed8d4050e841c7de278fe74f2663400ba4f88e10afc1c71ae4f96e0aaf7f67fc971024836c7229581eaf60f215882a568e2c72413fe26efb72fe77", 0xa5) getsockname(r10, &(0x7f00000007c0)=@in6, &(0x7f0000000800)=0xc) r13 = dup(r10) sendto$unix(r13, &(0x7f0000000840)="e9931c5661fb119eb4fcdd9c0eda79d530cd0ba464804780a21c20f81e1efeefd00110ccc1294f3645fdea0ec7716c4d6bb83c49472aeb24864d77da160cbd6b813163d75b486faca33cca4ed12fab5187c9095135239b1f4ed3f03339c656b72884a3b9d7eb799b54426bd325ec3179090fba1a3a88ba9f6dc983bd6b9c60f2c0aafbc079ff8ba2201fb85f345610f7691c529be355b23b1cb88b4242649f86cf794fab3c7187eb57664fd7221979812091eb5c477bb3ca79e8b4eb4f0f98798587037e731f25d4beec9130a54e34ec746696a0118868e8530147e5cce12b3c62e43b9b414dc3", 0xe7, 0x4, &(0x7f0000000940)=@abs={0x0, 0x0, 0x1}, 0x8) sendmsg$unix(r13, &(0x7f0000000c40)={&(0x7f0000000980)=@abs={0x1, 0x0, 0x0}, 0x8, &(0x7f0000000c00)=[{&(0x7f00000009c0)="bfd40c8db576d402f855f6b8b33e71a522eb42c48fda0f6aea6558a2087116379dec9fd445ecdd0f", 0x28}, {&(0x7f0000000a00)="e01cc8f45c5a51bd8e8898d4cae81e7b46002e5af816dfa71f44a3acab78553ca572f5e407cd72b61d1c00e2c7addca2527fc91fe6ed1ba96f06a8c9a21176e1df3def9c1f695ffdb03b8fefbb861a2c5553a6c677c67595de552f83e704daf62248fd91b3c6115564152aadce6fc480bf2514578073643c40a5ffd23c2000a4aab708804c42094e3041bd67158a5e2804fabdc9c46246ca1164b68dff2bf96c77905b0b1a4716b2e93fb4132a9c897c0cf369f41d827705c42f3812dacc183efdc4819a1008a7a63059908a801b99c60d79378b32468332b93f1c394b335fb128f0e0f3e1222ddfbc0c1c73", 0xec}, {&(0x7f0000000b00)="d9622bdc97905483dd574dba309d965ca79784766c893615232c717f", 0x1c}, {&(0x7f0000000b40)="f5acd925ff926003505ed85a50daff88503f92f9cc94ca8896c790b361f90ea68af3f0a24f91f2e24748e7eb27a54648f55d456e9fc23e04eb0b797017748acc60ad26dc28fe6390d6ad696878d936e6713eb2a3cb80dc8383e1160fb906de3074869a5f124c63e27162dc2e1f7ce2f20ae3cf9316479146c91c65c549b9a927999bf9ec23dca5387383573ffbd7a29e45fe95ce7e7a3461c2388abb607607ffb79c8d9749ba4071570d1c06924ff77f4ec499c47eac3682", 0xb8}], 0x4, 0x0, 0x0, 0x4}, 0x40a) shmget(0x0, 0x3000, 0x100, &(0x7f0000ffa000/0x3000)=nil) shmget(0x2, 0x1000, 0x400, &(0x7f0000ff8000/0x1000)=nil) shmctl$SHM_LOCK(r11, 0x3) r14 = accept(r13, &(0x7f0000000c80)=@in6, &(0x7f0000000cc0)=0xc) dup(r14) bind(r14, &(0x7f0000000d00)=@un=@file={0x0, './file0\x00'}, 0xa) getgid() [ 32.5904497] #6 0xffffffff80a80437 in in6_selectsrc [ 32.5966363] #7 0xffffffff80aa7b7f in rip6_connect_wrapper [ 32.5966363] #8 0xffffffff80f69206 in do_sys_connect [ 32.6097085] #9 0xffffffff80f693ef in sys_connect [ 32.6163954] #10 0xffffffff80ebbb34 in sys___syscall [ 32.6163954] #11 0xffffffff80265b1e in syscall 03:14:15 executing program 0: clock_settime(0x0, &(0x7f0000000000)={0x1, 0x8001}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000000) r2 = dup(0xffffffffffffff9c) renameat(r0, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') setsockopt$sock_int(r0, 0xffff, 0x80, &(0x7f0000000100)=0x4e6a, 0x4) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x40, 0x12) fdatasync(r1) r4 = dup2(r2, r1) r5 = dup(r4) r6 = dup(r5) getitimer(0x3, &(0x7f0000000180)) sendto$inet(r5, &(0x7f00000001c0)="91bf004c4260121d8ab75c5ed11ae7072926be6eaff3c2f1de650048240cac28ed0468448e5705552bc8ea8345c01cd24b0ab2823d23cbafc6362b2df3c9d12216f99c5c301c0e8351ec5f5c87d88bb57c2ab22dd33b6a7fa3cfe7d838863cfd0418b4e05d551c5dfc29228a947c6d68f76aef38fed4d89f68ac759bd4b00ce403bcc6a6fa7c85503de445f126cf50ade92f29ab768293aff9b37ef442d962a37b9945abe884a0b65c71034d8ce92813ffe6abbe8335608d21b6044713", 0xbd, 0xd, 0x0, 0x0) unlinkat(r5, &(0x7f0000000280)='./file0\x00', 0x800) getsockname$unix(r2, &(0x7f00000002c0)=@abs, &(0x7f0000000300)=0x8) getsockopt$sock_cred(r5, 0xffff, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$SO_PEERCRED(r4, 0xffff, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0xc) r10 = getgid() getsockopt$SO_PEERCRED(r5, 0xffff, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0xc) getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0xc) getsockopt$sock_cred(r1, 0xffff, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) setgroups(0x7, &(0x7f0000000580)=[r8, r9, r10, r11, r12, r13, r14]) setgid(r9) renameat(r4, &(0x7f00000005c0)='./file0\x00', r2, &(0x7f0000000600)='./file0\x00') writev(r1, &(0x7f0000000900)=[{&(0x7f0000000640)="e7c8cd4c6a7cf6abc3931fbcb253b33e2caef1ca0fcb2fe74048780f914c9d84549a4e0ebfdbfe0941a42c4e8a0c06eb66d25c44a468f0bfb12d4b1cbf0ef155abe109418d65c8fe2c75f054c8173fe58c73fd14c96ab3fc10c7fd051060f765", 0x60}, {&(0x7f00000006c0)="7cdea6f67fa0adaa14465c50c383ce2d2b26d1a58e7704beef073b9988de3c311f3748456d86bbab672c2ee76a0f4395d1dd0ebea95e364fbf583718ba3109ec65ab7d76d3b6873eee0e9bc49081a341e917281669975ab38397e6bb1899cf76a24e04b0572615dba23b6431dbd13ffcf0c8b3383c7376755e86a13d764836707ad7af40e64add7f7c451d8e", 0x8c}, {&(0x7f0000000780)="d6134980c0935df113944ccd000f885a2b0669e4292a973b791a02ed52e922a55a8c4db6be56bee01ed6191124ce2634d718897e7b22aa3126dd0fda70aa307c8752770369550e96cff4380d52c708", 0x4f}, {&(0x7f0000000800)="f727a6138b60f38247ed02bb27cef803dee995e40cafc6ddb3259e177041f027c6f73def67906bccece9997da2e452a531be034c9bfda9d437d0f1cc30ecc6981b5fd07a67176c6b64a30f4995c23fede5de42c2f2d6f890ac1d54b7bbbd2dc4fb8884413d0d2f", 0x67}, {&(0x7f0000000880)="79f21cd48586aa5665fb746de3aff25b28adb894a32794d5ac4bca247c6a87dffae083374f3b46ecf096b59da212a9d9a38815409f3d3ffb1ad9b60c227c44d5e7c1e792a03f88eec510e8193b", 0x4d}], 0x5) renameat(r6, &(0x7f0000000980)='./file0\x00', r1, &(0x7f00000009c0)='./file0\x00') setgid(r8) setgroups(0x1, &(0x7f0000000a00)=[r11]) getgroups(0x5, &(0x7f0000000a40)=[r12, r12, r10, r13, r9]) fchown(r3, r7, r15) 00:00:01 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) pwritev(r0, &(0x7f0000000b00)=[{0x0}], 0x1, 0x0) msgget(0x0, 0x20) 00:00:01 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0x69, &(0x7f0000000000)={{0x18, 0x1, 0x9a72, 0xffffffffffffff7f}, {0x18, 0x0, 0x1, 0x9}, 0x3ff, [0x3, 0x4d6, 0x10001, 0xfffffffffffffffd, 0x0, 0x6, 0x1, 0x698]}, 0x3c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f0000000040)={{0x18, 0x0, 0x6, 0x4}, {0x18, 0x3, 0x9, 0x9}, 0x778, [0x1ff, 0x200, 0xc3, 0x3, 0x81, 0x3b7, 0x1000, 0x59]}, 0x3c) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x210, r0, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = fcntl$dupfd(r0, 0xc, r0) r2 = getgid() write(r1, &(0x7f0000000080)="9faf1bbe02999c2ebd5ff58975b51dd23dd753b46c4091eaa9faf490ceddf7b1bcde53a32ae3825838fdefda1dc4b7ee8c172d1fb982f813d15568c42f004de53af2cf69ce3e3d7594822a75301e0e", 0x4f) r3 = accept$unix(r0, &(0x7f0000000100)=@file={0x0, ""/4096}, &(0x7f0000001140)=0x1002) fcntl$setstatus(r1, 0x4, 0x20040) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r4 = msgget(0x1, 0x65) r5 = geteuid() r6 = geteuid() r7 = getppid() getsockopt$SO_PEERCRED(r3, 0xffff, 0x11, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0xc) msgctl$IPC_SET(r4, 0x1, &(0x7f00000011c0)={{0xffffffff, r5, r2, r6, r2, 0xf2, 0x5}, 0x5, 0xffffffffffffff69, r7, r8, 0x80000001, 0x800}) fcntl$dupfd(r3, 0xc, r0) munlockall() close(r3) setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000001240)={0xbedf, 0x9}, 0x8) r10 = fcntl$getown(r0, 0x5) bind$unix(r3, &(0x7f0000001280)=@abs={0x0, 0x0, 0x2}, 0x8) socketpair(0x1f, 0x5, 0x3, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) readlink(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)=""/136, 0x88) r12 = dup2(r11, r0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000001400)={{0x1000, r5, r9, r5, r2, 0x2, 0xffffffffa13136eb}, 0x3cb8, 0x80, r10, r8, 0x38b1, 0x3, 0x400, 0x1}) fcntl$setown(r12, 0x6, r10) getitimer(0x3, &(0x7f0000001480)) wait4(r7, 0x0, 0x52, &(0x7f00000014c0)) 00:00:01 executing program 4: r0 = socket$inet(0x2, 0x4, 0xe1b6) fcntl$setown(r0, 0x6, 0x0) r1 = fcntl$dupfd(r0, 0xc, r0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x10) 00:00:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x240000, 0x8) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040)={0x1, 0xfff}, 0x8) listen(r0, 0x8f4c) write(r0, &(0x7f0000000080)='\v', 0x1) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x6dcf43bb734d63b9, 0x0) r2 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat(r0, &(0x7f0000000140)='./file1\x00', 0x680, 0x20) sendto(r3, &(0x7f0000000180)="1fab7ce6c0caf93a642350891483a52067d81cb45687838b5977516104ce409143b2ccaa117d4cfea5780f06cc7bb35c9018cbd4f84bbdffc17c972608491c59cf6b", 0x42, 0x1, &(0x7f0000000200)=@un=@file={0x0, './file1\x00'}, 0xa) listen(r0, 0x7) connect$unix(r2, &(0x7f0000000240)=@file={0x1, './file2\x00'}, 0xa) getsockopt(r3, 0x0, 0x7, &(0x7f0000000280)=""/4096, &(0x7f0000001280)=0x1000) pwritev(r3, &(0x7f0000001440)=[{&(0x7f00000012c0)="21db266b9057d0734748294de74013d51f7495650f61ff0e6dd8e70e708fdd8167193d2b53399602858a54358aff9d7a957e6e1988af5ebdafd689349e6a9f446a15ea85d5dcc0bc83403305c5", 0x4d}, {&(0x7f0000001340)="2792a71faae29a367a197c12208923a2e2b6e892e91efec0dee6450273221ce098ed6c9fed267307ff28fdb25645914e812330ee710351f3b8fbfd0f4f97437fdb2ac9b4cc3bbdf47827b56afc9b5ca23c65c64e4c4d4af1b0eb9549ff6ff96f0d06d13fe2863f090ac92d4eaced505aa3a223fa36e97bd5faa544078800715bdf8010220d1bcdcc48b153a2bce0b331c5c569d33f46f3d2dfa1339e1e655d3b77c6eb25922b167a126ba9212185ef998cc16ce56b875dfd2821b2ecc07a6bdf0cfa3a1c19cd9242796857bdccc4cb886153f7d14aa2ee2cf29a2c650fb892fb9506c5bbb4c349b72549356d1f13fa940f32a2b215", 0xf5}], 0x2, 0x0) pwritev(r1, &(0x7f0000001500)=[{&(0x7f0000001480)="5041b4d73be4c1a01aed94464e60620acda59f4d86cb9e66669615a48621b74c410a158a77f1454a10c8d52e1cd38ecbead7cdc570208996ecca4739a3cfb1eb75de394e85d4f5", 0x47}], 0x1, 0x0) geteuid() clock_gettime(0x40000000, &(0x7f0000001540)) r4 = accept(r0, 0x0, &(0x7f0000001580)) r5 = socket(0x18, 0x40000001, 0x0) recvmsg(r4, &(0x7f0000001740)={&(0x7f00000015c0)=@in6, 0xc, &(0x7f00000016c0)=[{&(0x7f0000001600)=""/41, 0x29}, {&(0x7f0000001640)=""/106, 0x6a}], 0x2, &(0x7f0000001700)=""/61, 0x3d}, 0x800) getuid() connect$inet(r0, &(0x7f0000001780)={0x2, 0x3}, 0xc) bind$unix(r4, &(0x7f00000017c0)=@file={0x1, './file3\x00'}, 0xa) recvfrom$unix(r5, &(0x7f0000001800)=""/107, 0x6b, 0x800, &(0x7f0000001880)=@file={0x0, './file1\x00'}, 0xa) getpeername$inet6(r4, &(0x7f00000018c0), &(0x7f0000001900)=0xc) setsockopt(r0, 0x5, 0xfffffffffffffb72, &(0x7f0000001940)="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", 0xff) setsockopt(r3, 0x5, 0x9, &(0x7f0000001a40)="e0d5f309696a721ee616dcb858f1a6c1b781496724b707740fc42ca44a23a7a4adac13a38ea7c92099328e5950859f3d735583315e10ecc8a53a54a186dccbda4c2689cbb9b9c713bd1cd1a0558c19bd8f886f2d12651a9763c4573c5836", 0x5e) fcntl$setstatus(r2, 0x4, 0xc0004) write(r3, &(0x7f0000001ac0)="6435e60009777529dbdb936621e8112ebb33524bf6ac947a7d8187695278569e405f3a2c208640ddfbe19c3def6637c7ad6b67aaf53246522c44223e57bd1b0dc27370c32d11237a7a1d185935fcf14f767083b1692931de18f878999868b16644095de2b0259aa77b2a969c1f2f9c9754d6416dbffe6a83f30e40d7ea4afdedf2d76555a2290e3c9e4ac7114e0ce7de68a5bf7d8978e07d8e", 0x99) bind$unix(r3, &(0x7f0000001b80)=@abs={0x1, 0x0, 0x3}, 0x8) bind$inet(r4, &(0x7f0000001bc0)={0x2, 0x3}, 0xc) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 00:00:01 executing program 3: socketpair(0x0, 0x40000006, 0x0, 0x0) pipe(&(0x7f0000001600)={0xffffffffffffffff}) writev(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)="8f441a1ad6988f7edd10e72abf955d6298b2fd34acf039230d8eecca200979d8e8884245053624bfe72fb75dbccb9b513c94f541a9f6a18eb93f487ae1f5dae48b29fc8151c6bc2347b361bebb000eeaad1cfe1f9bbe62a3d410bb044ff0febb9ee4609bc678b16985295a783024d45efdbff284210cf0616ece41c7a6d7d0c4cb1f9c58b0e2405a0836cd590e7088f896589144da7744ee784e63228a29580a8b7c33d495c25a5dfd96842857e1eba7531163fdb1764f6a573f4dc00a502870395fd716817e5131997af4770d3dfe6e84c6a44937bc7c5991f29828eb53381cdc230e0c754dd031cfcbf3df01719267c8813188a81326bf86", 0xf9}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="39de44d7c460dda63c3428d3dbfb53f1bc9681c6756327891345848edf591503127060b83b9c0d274061f6453908b0c8b9825cd0b48bcf427fe3ec6cd9998676c901d70fcb9b4675add54206c32d0a4dfdde2e60d0ca27cf2119c55ab83a4836cd823cf01ae9de2749219112df97b607765a0cd84d2ede38179acb1ce3fb51dea9c0f5b7769cad25811d8b354771f6016c37ecfe1271ac993ac5b604b869d0575636ba30129dd471430f80e39442a87562f67f7c81d29a3403edc38abf1182031e633b55d667e6d5a78a38d6381c", 0xce}, {&(0x7f0000001280)="6f806a29f20633ff309952f9570179e42586da7333aadcf8b15aaad0207fd493ccf2be68689cf5e9c8d9014a5c8dd0639f9a273aee8c3b824efb9d51310904cc1c1c92d04e4d9f401daf547b626ef50176fed5cb720ffb006fe5eb0b5a6f59c6f9c0aad813a47036738437016a9d8efe99e6e849b381ea411a412e16d9cc382cd5ec6b4c06a5cd54b4d02f983707d952095efae0332c97defa7c131334039138b9b3d5638cbad5da633483863fe1a488888282a623c57d18e3eac4e8e4d89b3239ab69", 0xc3}, {&(0x7f0000001380)="2f3d334ec8e5cd0a592ababa599a48b944755dad9fddee4f09560e25200cf72cfa7639b841525003a0f17e1a13731ebac224df472c82b6e31d7b7763cf4384831db6e645328df5077be2fb7833190a862c16", 0x52}, {&(0x7f0000001400)="5f4ff876d32a64da176ee66e926f03be18d368b9edc0c7033114bd8fa00c63ddd5fa60d9f3afa198be9dfc9068eb4be9255dbb28edcf357f985f89099e01a7b618374125bfd466f27c58cf488fc4b940e0249481a24f9f70d62c20dde5d12ea6e7851cc5fc1684fb31e54fdba520305d36c1a8051770adb0cc29ace2027d88ac2bec29c46fd4cfd35d07bc3fdc63895c6c283815019871ef7171b3fb37d1a86d8b37079a26", 0xa5}], 0x6) socketpair(0x1f, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) rmdir(&(0x7f0000000040)='./file0\x00') fcntl$getflags(r1, 0x3) 00:00:01 executing program 1: r0 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0xf9f9a32d4d25fc9e) shmdt(r0) semget$private(0x0, 0x3, 0x20) r1 = semget$private(0x0, 0x0, 0x10) r2 = shmget(0x1, 0x3000, 0xc1, &(0x7f0000ffd000/0x3000)=nil) r3 = socket$inet6(0x18, 0x20000002, 0x9) getpeername(r3, &(0x7f0000000000)=@in6, &(0x7f0000000040)=0xc) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) fchmodat(r3, &(0x7f00000000c0)='./file0\x00', 0x4, 0x400) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x1000) r4 = semget(0x3, 0x6, 0x15c) getsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000100), &(0x7f0000000140)=0x8) r5 = fcntl$dupfd(r3, 0xc, r3) sendto$unix(r5, &(0x7f0000000180)="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", 0x1000, 0x7, &(0x7f0000001180)=@file={0x0, './file0\x00'}, 0xa) r6 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x400800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001200)={0xffffffffffffffff}) semctl$GETALL(r1, 0x0, 0x6, &(0x7f0000001240)=""/138) r8 = shmget(0x1, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r4, 0x4) write(r7, &(0x7f0000001300)="f759fd65a53e8e8eb022cf3e3c92a6c27fbfda730ba5fc2392b3bc11d504602d631a504e18a00ef5098d7c10a2f8f99ff05c7fdeadd93cdfe25e074a88ea31c604d70506c8ea8f6a439b50e57a72dc224cc1fb443cc250f695383e4787aa3a0ef8835570897ec09eef363b1aa556322ffaccec1196fdd064fa09ec0e6512142f363896ffd6631cef1fb376da2e8951611525db8b1236fbed6d", 0x99) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0x69, &(0x7f00000013c0)={{0x18, 0x1, 0xe5d9, 0x2}, {0x18, 0x2}, 0x1, [0x3, 0x100000000, 0x80, 0xe41f, 0x9, 0x800, 0x9, 0x2]}, 0x3c) unlinkat(r6, &(0x7f0000001400)='./file0\x00', 0x0) r9 = accept$inet6(r5, &(0x7f0000001440), &(0x7f0000001480)=0xc) listen(r9, 0x6) bind$inet6(r5, &(0x7f00000014c0)={0x18, 0x3, 0x1597, 0x5f}, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001500)) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_UNLOCK(r2, 0x4) shmctl$IPC_RMID(r8, 0x0) listen(r7, 0x7) 00:00:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x9) setsockopt$sock_int(r0, 0xffff, 0x1000, &(0x7f0000000000)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0x8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x2}, 0xc) getpeername$inet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) sendto$inet(r0, &(0x7f0000000100)="c4ac43e959a2ef6d7a5e8bbca2b016e425c48ee7c6d2a3fa23e581ada78562a8a32037f91500409cd6c016dc14027e343db6980b", 0x34, 0x8, 0x0, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0}, 0xc) sendto$inet(r0, &(0x7f0000000180)="550792e4310dd1a390bcc843c40f5aad0cd73b3029accdfe7248e26c6ff1b26ca9", 0x21, 0x1, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) connect$unix(r2, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0xa) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffe000/0x2000)=nil) r4 = accept$inet(r3, &(0x7f0000000240), &(0x7f0000000280)=0xc) bind$unix(r2, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0xa) recvfrom$unix(r2, &(0x7f0000000300)=""/24, 0x18, 0x841, &(0x7f0000000340)=@abs={0x0, 0x0, 0x1}, 0x8) connect$inet(r1, &(0x7f0000000380)={0x2, 0x3}, 0xc) r5 = geteuid() sendto$inet6(r2, &(0x7f00000003c0)="047944f3cde27d4b24ac32562dcdaaa315fa13ce550aee1370580779d6a1cf11870dc312d6661bda2e1cde881ea98d739fc458433cfca034eab4376f91102bc598e5c676ec57b9d489123c0b", 0x4c, 0x8, &(0x7f0000000440)={0x18, 0x2, 0x9, 0xffffffffffffab5e}, 0xc) r6 = socket$inet(0x2, 0x7, 0x56a) connect$inet(r6, &(0x7f0000000480)={0x2, 0x0}, 0xc) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0xa) listen(r4, 0xff) getsockopt$SO_PEERCRED(r6, 0xffff, 0x11, &(0x7f0000000500)={0x0, 0x0}, 0xc) fcntl$setown(r1, 0x6, r7) setreuid(r5, r8) recvfrom$inet6(r3, &(0x7f0000000540)=""/214, 0xd6, 0x801, &(0x7f0000000640)={0x18, 0x3, 0x400, 0x10000}, 0xc) recvfrom$inet(r1, &(0x7f0000000680)=""/95, 0x5f, 0x40, 0x0, 0x0) accept$inet(r1, 0x0, &(0x7f0000000700)) pipe2(&(0x7f0000000740)={0xffffffffffffffff}, 0x1400000) sendto$inet6(r9, &(0x7f0000000780)="48731e7f2b7af447447a40c8bdf2af2c2569d0e7619318c61957fcd9ff27a2e42eaddd1a64191ac1275d68ecaecfda2edd8c890c791433aa492c9461a9a69f8aeba982b9eec1df200a4cac54e78500d0dad70abe7d0ff7cd5f1c54560c87405316ffb39ed11a0227e3c8f83addcfc2b7e18b672722f18d49050c53ee6307d949cf070ad429dba8481a1a088c0237d269b5188021a41beb7f6b63bed3e04687c582ffa4347341439b0337d617c78cffcbb4634026e66b9188aaf77f7833cc346a4c9a6d016b635ce0c33044d25d778d4606081ad861b3c908891d", 0xda, 0xa, &(0x7f0000000880)={0x18, 0x3, 0x1ff, 0x6}, 0xc) sendto$inet(r2, &(0x7f00000008c0)="e212dea16304e6240307568d9737a09ea39be9671afac72622d347d06d75f919bea827b1ac614134676d966df43ec6181c747a192d75c969acf3ac2f", 0x3c, 0x400, &(0x7f0000000900)={0x2, 0x2}, 0xc) 00:00:01 executing program 4: r0 = geteuid() r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) getsockopt$sock_cred(r1, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x104) r5 = dup2(r1, r1) recvfrom$inet6(r5, &(0x7f0000000140)=""/39, 0x27, 0x840, &(0x7f0000000180)={0x18, 0x0, 0x3, 0xd5}, 0xc) getsockopt(r1, 0x7fff, 0x3, &(0x7f00000001c0)=""/24, &(0x7f0000000200)=0x18) r6 = socket$inet(0x2, 0x0, 0x0) lchown(&(0x7f0000000240)='./file1\x00', r3, r4) sendto$unix(r1, &(0x7f0000000280)="886a9f13a26c87b619578498c7cdd07fcedb9b42a5476de2aaec985236cdece6fa9d0fd80bfb76410dd1bb325dcec0b4260399e896380f289aef19e8b37d9e1706c4929686501902020c1b68e2322815513328a9448e8c8037de2856b21af74faaf1dc599de5e070010dfe30", 0x6c, 0x40c, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) connect(r6, &(0x7f0000000380)=@in={0x2, 0x1}, 0xc) socketpair(0x18, 0x60000000, 0xffffffff, &(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$inet6(0x18, 0x4, 0x80000000) recvfrom(r8, &(0x7f0000000400)=""/34, 0x22, 0x41, &(0x7f0000000440)=@in6={0x18, 0x0, 0x8, 0x200}, 0xc) lseek(r5, 0x0, 0x0) socket(0x11, 0x40000000, 0x7f) pwritev(r6, &(0x7f0000000540)=[{&(0x7f0000000480)="6452f81b6ec6625dc2e77f9e1ba7fad385d04961ca3634962cecdc43cd83323aaf697d5db0fb9ba329bfb5760d8b2a56bf9192df0e4c860ff33254f6652dd14932c157bd342c68fe946ebf55c32b0373906afbbdd92e47c2cdcfba35eeb8660751156d054081024f26a3b621499e5948c1b4b9223a49fe9fd29bcb79a127d934c94e961fcb60d5026a54e0e646fbafed88fdf4c68614f724bb970330c054cd358e3f673b2b1016d68841fb4c1da30cb224c04c1dd3", 0xb5}], 0x1, 0x0) r9 = semget$private(0x0, 0x0, 0x10) semctl$GETNCNT(r9, 0x0, 0x3, &(0x7f0000000580)=""/192) getsockopt$inet_opts(r7, 0x0, 0x0, &(0x7f0000000640)=""/109, &(0x7f00000006c0)=0x6d) pipe(&(0x7f0000000700)) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) clock_nanosleep(0x3, 0x0, &(0x7f0000000780)={0x5, 0x100}, &(0x7f00000007c0)) recvfrom$inet6(r10, &(0x7f0000000800)=""/137, 0x89, 0x41, 0x0, 0x0) seteuid(r0) geteuid() setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f00000008c0)={r2, r3, r4}, 0xc) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffc000/0x1000)=nil) shmget(0x2, 0x1000, 0x80, &(0x7f0000ffc000/0x1000)=nil) 00:00:01 executing program 3: r0 = geteuid() seteuid(r0) r1 = socket$unix(0x1, 0x0, 0x0) getsockopt$SO_PEERCRED(r1, 0xffff, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc) getsockopt$SO_PEERCRED(r1, 0xffff, 0x11, &(0x7f0000000040)={0x0, 0x0}, 0xc) chroot(&(0x7f0000000080)='./file0\x00') setpgid(r4, r2) sendmsg(r1, &(0x7f00000004c0)={&(0x7f00000000c0)=@un=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000000280)=[{&(0x7f0000000100)="a483f774b2cef98aa4c6a4c0f1cda0910e2fa74ead8e5a7778ece0297d13539701c148cab06d3d49d5cb49c07c639723ef58fe7f3c2f057800a472a31ba1c1840568797f986e395f719e93893a3753a10e1ab0264a45aeda262635c7f9e96f896160f9274d950d07d873210aa5bed3780275557f64963ebfe9bd20d22aa0bd818f3fc5742233027efe1ac9ec00", 0x8d}, {&(0x7f00000001c0)="0f9ae1", 0x3}, {&(0x7f0000000200)="aa9b466d02bdafc24f94b6dc82ff0fc2424a0316e2e96ebc08aad829c606340dcda2e98f60a85fa233669d2aa786788a75957daab1ebb3d5afd24afdca6e109652fabe5058f6d5da4ecc99ddb75cd63f6862ccc4c0f9d8508bd1d7b9ace0037d7ffd8b06cf6eb547b3e40f006fc7", 0x6e}], 0x3, &(0x7f00000002c0)=[{0xf0, 0x111, 0x7fff, "212e6d2893d35e0a191e9f6c7e7f5e38fd5cd2ae676fa5e657623554a5e705623948ca80b067908d6da0c49019d9d3767af79ffe49fc83c2298a60d34f7a0de35b7a11a15369f8caa92514ddb3f007908450af20c6490c94c836fca8885dc919e7e815993e1c9503c216099ca972624e492f062ffc5ce54e89bd768ae2de4b67b34457b29bdd882467eea767ea3a51bfa0ffa26126f315b6918268022fb94b5d254fae32197623f3c7bb9c62f02ff4efc21db808ff88396b06c88f006927462fbef7263a42bf298cb3693c82dabe73c23a43df69b0017b9035595e36bb"}, {0xe8, 0x6, 0x1, "7fbff7ca81be1709de54d3c55cb38d73f24c3073050a115369a30dd11001dfb092bd2567729c00f276b6157949f84d54eb386754d60446a4a47bc4905b12b9528f1b035fadce2dad3f7f5d379f32c102bd63ea5c9cf0b8ed6e6054eb26796a3aa788fd6aa6ed78d37181962a749b46190eb8bc76c6a6ebe298553e12ab2699b2293611db8994a949a593c954255e6f0a65568026ad2d8c0171e28a78347f2fa1cf89692a7ffb904a58ca00227eb7243a71115f9e41487605ea7709e6ad7c874c29ddb07bf1f2648fb272abbb5db60a8d982e99"}], 0x1d8}, 0x400) getsockopt$SO_PEERCRED(r1, 0xffff, 0x11, &(0x7f0000000500), 0xc) clock_settime(0x60000003, &(0x7f0000000540)={0x1f, 0x8}) shmget(0x1, 0x4000, 0x410, &(0x7f0000ffc000/0x4000)=nil) symlink(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00') shmget(0x3, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) flock(r1, 0x0) fchown(r1, r5, r3) semget(0x1, 0x3, 0x390) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r7, &(0x7f0000000640)={0x18, 0x0, 0x2, 0x80000001}, 0xc) mknod$loop(&(0x7f0000000680)='./file0\x00', 0xc108, 0x1) connect$inet(r6, &(0x7f00000006c0)={0x2, 0x0}, 0xc) shmget(0x2, 0x4000, 0x100, &(0x7f0000ffc000/0x4000)=nil) getpeername$inet6(r6, &(0x7f0000000700), &(0x7f0000000740)=0xc) getpeername(r7, &(0x7f0000000780)=@un=@file={0x0, ""/108}, &(0x7f0000000800)=0x6e) pipe2(&(0x7f0000000840)={0xffffffffffffffff}, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) fcntl$setstatus(r7, 0x4, 0x40000) close(r6) writev(r8, &(0x7f0000000b40)=[{&(0x7f0000000880)="e1f114ad23794f2da9995bc1549cd2a0905a44a3233887c8b4cda25b8858d4d70b32c90b3168f0da10a000a9a49582c282f00434cc2679e233409da00a136fc6d496bba8fad8ad37f69d20b1ad500956e47d24ca16c35a8a30910241ea9187d688da623bd31092ee6bbae741d18a64a81515e7ad7df10259c0f728a6147d45322ee23b6d785e97701714f69a33d3905e3d0b5375", 0x94}, {&(0x7f0000000940)="843b2ee5df8e4510b01402a01d3b22d56a5c6a0637e0a4a406e680f53324759bbfdec50cf9fb9f5c5add8c7cad602ae9cac5e0270d227a65255a9ce047165ddcbc2e09177cc696d88463822f93356fb474bfccd7ffa4e1b8223b6163bab777a2e61fc4ddb9ad0aec2fd5c291fe1967d8d2d2d48073dfa126efcaf3cd9d41cdc3f5c172ee8020c4a637", 0x89}, {&(0x7f0000000a00)="f2d0af39f9aa3f46d7dab7faa361745d4906c2b248a410c27e60c8d0f3d4e18f467d422b64593d274a1c916098a38411ac9b5e685faaa2587d67b8dda1847e04b3de7c28dffe85ea5eb9dc4e30e11e81e84c62b97fa9bdace1e50be7edbfa27a23ed0e66a2f7bda01522c59b4a6b6ed9e46165f70f4119902d2d65c446c86bbf", 0x80}, {&(0x7f0000000a80)="435869c31077de2b62e44ac0d64689e35ed05a78014ddd5f2e0684577c0c770b7358a5a570d93db23d093cecce1f50fe4e44cb17e420cb01f878ae4eefcbc7bb4337dcb1e3ce19835faab07bb34014352911aae7ab9cf2190a13b1fce9d863009e5279d0c830c11caf1056ac1e754240b1f36885e4418675e0c070643bfdccbe7c6fd59d06c356e6c43e0aee5537b9d70eb1e48369bd54566a5e9c753e5b187b5fe1fbe9228651", 0xa7}], 0x4) getsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) setsockopt$sock_int(r1, 0xffff, 0x0, &(0x7f0000000c00)=0xfb, 0x4) 00:00:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x201, 0x20) connect(r0, &(0x7f0000000040)=@in6={0x18, 0x1, 0x6, 0x75d}, 0xc) socketpair(0x12, 0x50000000, 0x6, &(0x7f0000000480)) accept$inet(r0, &(0x7f0000000340), &(0x7f0000000380)=0xc) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/141, 0x8d}], 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x3}, 0x8) r1 = dup2(r0, r0) bind(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="001f6c653000"], 0xa) lseek(r1, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x4, 0x6) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x110, 0x1) 00:00:01 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000080)={0x0, 0xfffffffffffffff8}, 0x8) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x400402, 0x10) r2 = fcntl$getown(r0, 0x5) getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0xc) getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0xc) getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) r6 = geteuid() r7 = getgid() r8 = getpid() getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) r11 = accept$inet(r0, 0x0, &(0x7f0000000480)) sendmsg$unix(r1, &(0x7f0000000600)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f00000000c0)="bddd5c54e79914c59bf0a919f25a3fbf8bdc498afced528ae888396a817eeb036c3bbab16614ef33c7b1c057168cd61e57b77b3273af21eb1bb0a74200f3cd836d7e52d9f98cd0c66cf42b31a63e39e36379fba90ba8922a790724c7106836ffe31979e0be7d90ffa1f0e75e3cfaffa57961f7153f33e4018cd82a4a0516afdfde12b6944c59e6bbde037313cffb07d32d163b024f6147b499523e2df21a5a0c74e61370c9c842bee5d426ac352d7dab9a86", 0xb2}, {&(0x7f0000000180)='f', 0x1}, {&(0x7f00000001c0)="73c0790140a97c40cc76b8239ab4aaa44c8dad8d8019e6423b1241cf91e272e38e6308b0aa33935246f5316683232b1f99abd4eac5d82b5b50f1f5e717b1f3405012317da90f36cd5f012ce0ab0cdee513c66b813ea9ac951be4a7ddd1cadbca72f6b0e2ddeaaa03272c2e056e", 0x6d}], 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000020000000000000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000002800000000000000ffff000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002800000000000000ffff000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002000000000000000ffff000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002000000000000000ffff000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="000000002000000000000000ffff000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="000000001800000000000000ffff000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="2000000000000000ffff000001000000", @ANYRES32=r0, @ANYRES32=r11, @ANYRES32=r0, @ANYRES32=r0], 0x108, 0x400}, 0xe) 00:00:01 executing program 3: r0 = open(&(0x7f0000000100)='./file1\x00', 0x40701, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ftruncate(r1, 0x4000000001) 00:00:01 executing program 1: r0 = msgget(0x2, 0x2) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/231) r1 = msgget$private(0x0, 0x2) r2 = msgget(0x3, 0xa) r3 = socket$inet6(0x18, 0x10000003, 0x10000) getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r8 = openat(r7, &(0x7f00000001c0)='./file0\x00', 0x50, 0x80) msgsnd(r1, &(0x7f0000000200)={0x0, "148d457074a9fe16a0117fe74549c574baf9b5bcff406d7d6154e77e0dd0f5511cab6e0ea4463988a25aaf0c6b177db68d53ffed85bf0eaf1033225a1efa29cca6a917bf9a9772bb0126a6b1810fdacb52fa53d13cf0a6be7d8547c9e6054ba2ecc32a1fe17c7909642ec54bd05f2707169d5f59ae9671f1bedc253ab235b7773ff751ae011f6fe805981c61d71a"}, 0x96, 0x800) fchdir(r8) recvfrom(r3, &(0x7f00000002c0)=""/42, 0x2a, 0x40, &(0x7f0000000300)=@in6={0x18, 0x0, 0x800, 0xffff}, 0xc) recvfrom$unix(r7, &(0x7f0000000340)=""/193, 0xc1, 0x42, &(0x7f0000000440)=@file={0x1, './file0\x00'}, 0xa) recvfrom(r3, &(0x7f0000000480)=""/205, 0xcd, 0x1, &(0x7f0000000580)=@un=@file={0x1, './file0\x00'}, 0xa) clock_gettime(0x2, &(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000000) msgrcv(r1, &(0x7f0000000640)={0x0, ""/164}, 0xac, 0x3, 0x1000) r10 = socket(0x2, 0x4, 0x1f) recvfrom$inet6(r10, &(0x7f0000000700)=""/187, 0xbb, 0x40, &(0x7f00000007c0)={0x18, 0x2, 0x1ff, 0x8}, 0xc) pipe2(&(0x7f0000000800), 0x1000000) r11 = semget$private(0x0, 0x2, 0x2) semctl$GETVAL(r11, 0x1, 0x5, &(0x7f0000000840)=""/204) semctl$GETVAL(r0, 0x2, 0x5, &(0x7f0000000940)=""/116) fcntl$getflags(r9, 0x1) setitimer(0x0, &(0x7f00000009c0)={{0x5, 0x7ff}, {0x7fff, 0x4}}, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000a00)={{0x6, r5, r6, r5, r6, 0x12, 0x3}, 0x3f, 0x7, r4, r4, 0x1bd7, 0x40, 0xb3, 0xfffffffffffffffe}) readv(r8, &(0x7f0000000ec0)=[{&(0x7f0000000a80)=""/254, 0xfe}, {&(0x7f0000000b80)=""/148, 0x94}, {&(0x7f0000000c40)=""/218, 0xda}, {&(0x7f0000000d40)=""/190, 0xbe}, {&(0x7f0000000e00)=""/131, 0x83}], 0x5) open(&(0x7f0000000f40)='./file0\x00', 0x20, 0x10) setsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000f80)={r4, r5, r6}, 0xc) msgctl$IPC_RMID(r1, 0x0) semctl$GETZCNT(r11, 0x7, 0x7, &(0x7f0000000fc0)=""/47) 00:00:01 executing program 3: setitimer(0x3, &(0x7f0000000000)={{0x4, 0xfffffffffffffffc}, {0x2, 0x1}}, &(0x7f0000000040)) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1400000) sendto(r1, &(0x7f00000000c0)="ac62cb3e7e36bba8c3ec36d6eafb3274ea6b05fa096601ebbfadfca9571bd2c98a42b9d2d74208431b6c05f9fd7a64334fcd4c855783e46cec7859477de86f6559c2b218f35c5f368301c301ce503f7f66c19072132a3473ad5099ee62e99f857bb01f8b419620f094a7300e4dfec07d1786cac4cf1d778d9cd2597e9f2b0a76d48f9307bbeb9b3a5c51ab515aa97aaa78ec1acc5a2f6a27c039818aa76e4bce7dbb830e9f0d79a6bf0030f6d2ba627fa6d9a3cf913db1ba979f096f73138992965495d5d0e5d2f13457557202eae04d84e8868371c072507e7dbcf2d7255fef1cf378ba2bb13115cec0f43076", 0xed, 0x2, &(0x7f00000001c0)=@un=@abs={0x1, 0x0, 0x1}, 0x8) unlink(&(0x7f0000000200)='./file0\x00') renameat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00') renameat(r0, &(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000300)='./file0\x00') r2 = getpgid(0xffffffffffffffff) wait4(r2, &(0x7f0000000340), 0x18, &(0x7f0000000380)) open$dir(&(0x7f0000000440)='./file0\x00', 0x1000040, 0x10) r3 = getegid() getsockopt$SO_PEERCRED(r1, 0xffff, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0xc) chown(&(0x7f0000000480)='./file0\x00', r4, r3) getgroups(0x7, &(0x7f0000000500)=[r5, r3, r3, r3, r3, r3, r3]) r8 = open(&(0x7f0000000540)='./file0\x00', 0x1, 0x10) unlink(&(0x7f0000000580)='./file0\x00') renameat(r8, &(0x7f00000005c0)='./file0\x00', r8, &(0x7f0000000600)='./file0\x00') getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f0000000640)={0x0, 0x0}, 0xc) link(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='./file0\x00') fchownat(r0, &(0x7f0000000700)='./file0\x00', r9, r7, 0x600) setitimer(0x3, &(0x7f0000000740)={{0x8, 0x2}, {0x2984, 0x4}}, &(0x7f0000000780)) rmdir(&(0x7f00000007c0)='./file0\x00') utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={{0x7fffffff, 0x2}, {0x10001}}) rename(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00') stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) mkdir(&(0x7f0000000a80)='./file0\x00', 0x20) fchownat(r1, &(0x7f0000000ac0)='./file0\x00', r4, r6, 0x400) utimensat(r0, &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={{0x7, 0x5}, {0x1, 0x89}}, 0x0) connect(r0, &(0x7f0000000b80)=@in={0x2, 0x2}, 0xc) getsockopt$SO_PEERCRED(r1, 0xffff, 0x11, &(0x7f0000000bc0), 0xc) 00:00:01 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) close(r1) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x400004) fchroot(r0) recvfrom$inet(r1, &(0x7f0000000080)=""/92, 0x5c, 0x40, &(0x7f0000000100)={0x2, 0x1}, 0xc) readlinkat(r3, &(0x7f0000000140)='.\x00', &(0x7f0000000180)=""/47, 0x2f) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000004) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x1000004) close(r4) symlinkat(&(0x7f0000000240)='./file0\x00', r5, &(0x7f0000000280)='./file0\x00') r7 = dup2(r4, r3) r8 = semget$private(0x0, 0x3, 0x200) semctl$GETZCNT(r8, 0x2, 0x7, &(0x7f00000002c0)=""/129) r9 = fcntl$dupfd(r5, 0xc, r6) fcntl$getown(r0, 0x5) r10 = open(&(0x7f0000000380)='./file0\x00', 0x20000, 0x4) fcntl$getflags(r4, 0x1) mkdir(&(0x7f00000003c0)='./file0\x00', 0xf2) mknodat(r1, &(0x7f0000000400)='./file1\x00', 0x1006, 0x8) getpeername$unix(r9, &(0x7f0000000440)=@file={0x0, ""/108}, &(0x7f00000004c0)=0x6e) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4) semctl$GETZCNT(r8, 0x0, 0x7, &(0x7f0000000500)=""/14) semctl$GETNCNT(r8, 0x1, 0x3, &(0x7f0000000540)=""/157) dup2(r7, r10) getpeername$inet6(r9, &(0x7f0000000600), &(0x7f0000000640)=0xc) open(&(0x7f0000000680)='./file1\x00', 0x800, 0x100) dup2(r2, r6) getpeername$unix(r4, &(0x7f00000006c0)=@file={0x0, ""/4096}, &(0x7f0000001700)=0x1002) semget$private(0x0, 0x1, 0x100) 00:00:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:00:01 executing program 2: r0 = socket$inet(0x2, 0x20000005, 0x80000000) getsockname$inet(r0, 0x0, &(0x7f0000000400)) r1 = getpgrp() accept(r0, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = getgid() setsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc) [ 33.0671126] panic: kernel diagnostic assertion "c->c_magic == CALLOUT_MAGIC" failed: file "/syzkaller/managers/netbsd/kernel/sys/kern/kern_timeout.c", line 474 [ 33.0671126] cpu0: Begin traceback... [ 33.0671126] vpanic() at netbsd:vpanic+0x214 [ 33.0671126] _GLOBAL__sub_D_65535_0_cpu_configure() at netbsd:_GLOBAL__sub_D_65535_0_cpu_configure [ 33.0671126] callout_halt() at netbsd:callout_halt+0x327 [ 33.0671126] timer_settime() at netbsd:timer_settime+0x41c [ 33.0671126] dosetitimer() at netbsd:dosetitimer+0x3eb [ 33.0671126] sys___setitimer50() at netbsd:sys___setitimer50+0x127 [ 33.0671126] sys___syscall() at netbsd:sys___syscall+0xe2 [ 33.0671126] syscall() at netbsd:syscall+0x30e [ 33.0671126] --- syscall (number 198) --- [ 33.0671126] 7976f5e3f4aa: [ 33.0671126] cpu0: End traceback... [ 33.0671126] dumping to dev 4,1 (offset=0, size=0): not possible [ 33.0671126] rebooting... SeaBIOS (version 1.8.2-20181029_212248-google) Total RAM Size = 0x00000001e0000000 = 7680 MiB CPUs found: 2 Max CPUs supported: 2 found virtio-scsi at 0:3 virtio-scsi vendor='Google' product='PersistentDisk' rev='1' type=0 removable=0 virtio-scsi blksize=512 sectors=4194304 = 2048 MiB drive 0x000f2a00: PCHS=0/0/0 translation=lba LCHS=520/128/63 s=4194304 Booting from Hard Disk 0... >> NetBSD/x86 BIOS Boot, Revision 5.10 (Tue Jul 17 14:59:51 UTC 2018) (from NetBSD 8.0) >> Memory: 639/3144640 k 1. Boot normally 2. Boot single user 3. Disable ACPI 4. Disable ACPI and SMP 5. Drop to boot prompt